Saturday, August 11, 2018

Fundamentals of Thermal‐Fluid Sciences

Applications of the Bernoulli Equation
[NTC २०७४/१२/११ ]
Q. Water is flowing from a garden hose (Fig. 12–18). A man places his thumb to cover most of the hose outlet, causing a thin jet of high-speed water to emerge. The pressure in the hose just upstream of his thumb is 400 kPa. If the hose is held upward, what is the maximum height that the jet could achieve?[10Marks]

FIGURE 12–18



Solution:

Assumptions:

1. The flow exiting into the air is steady, incompressible, and irrotational.
2. The water pressure in the hose near the outlet is equal to the main water pressure.
3. The surface tension effects are negligible.
4. The friction between the water and air is negligible
5. The irreversibilities that may occur at the outlet of the hose due to abrupt expansion are negligible.


Constants: 

ρwater = 1000 kg/m3 


Calculations:

The water height will be at a maximum under the assumptions. The water velocity in the hose is relatively low (V1 = 0) and we take the hose outlet as the reference level (z1 = 0). At the top of the water trajectory, the velocity reaches zero (V2 = 0) and atmospheric pressure pertains.


   Therefore, the water jet can rise as high as 40.8 m into the sky in this case.


Discussion The result obtained by the Bernoulli equation represents the upper limit and should be interpreted accordingly. It tells us that the water cannot possibly rise more than 40.8 m, and, in all likelihood, the rise will be much less than 40.8 m due to irreversible losses that we neglected.

  

Sunday, February 4, 2018

IT Talks

Top Penetration Testing Tools

1) Metasploit 


This is the most advanced and popular Framework that can be used to for pen-testing. It is based on the concept of ‘exploit’ which is a code that can surpass the security measures and enter a certain system. If entered, it runs a ‘payload’, a code that performs operations on a target machine, thus creating a perfect framework for penetration testing.
It can be used on web applications, networks, servers etc. It has a command-line and the GUI clickable interface works on Linux, Apple Mac OS X and Microsoft Windows. Although there might be few free limited trials available, this is a commercial product.
Download link: Metasploit Download

2) Wireshark

This is basically a network protocol analyzer –popular for providing the minutest details about your network protocols, packet information, decryption etc. It can be used on Windows, Linux, OS X, Solaris, FreeBSD, NetBSD, and many other systems. The information that is retrieved via this tool can be viewed through a GUI or the TTY-mode TShark utility.  You can get your own free version of the tool from the link below.

Download link: Wireshark download

3) Kali Linux


Kali Linux is a open source project that is maintained by Offensive Security.Few prime features of Kali Linux include Accessibility, Full Customisation of Kali ISOs,Live USB with Multiple Persistence Stores,Full Disk Encryption, Running on android, Disk Encryption on Raspberry Pi 2, etc.
Tools Listings, Metapackages and version Tracking are some of the Penetration Testing tools present in Kali Linux. For more information and in order to download, visit the below page.
Download link: Kali Linux download

4) Nessus


Nessus is also a scanner and it needs to be watched out for. It is one of the most robust vulnerability identifier tools available. It specializes in compliance checks, Sensitive data searches, IPs scan, website scanning etc. and aids in finding the ‘weak-spots’. It works best on most of the environments. For more information and in order to download, visit the below page.
Download link: Nessus download

5) Nmap

“Network Mapper” though not necessarily a pen-testing tool, it is a must-have tool for the ethical hackers. This is a very popular tool that predominantly aids in understanding the characteristics of any target network. The characteristics include host, services, OS, packet filters/firewalls etc.  It works on most of the environments and is open sourced.
Download link: Nmap download

6) w3af

W3af is a Web Application Attack and Audit Framework.
Some of its features include fast HTTP requests, integration of web and proxy servers into the code, injecting payloads into various kinds of HTTP requests etc.
It has a command-line interface and works on Linux, Apple Mac OS X and Microsoft Windows.
All versions are free of charge to download.

Download link: w3af download

7) Zed Attack Proxy (ZAP) 

ZAP is a completely free to use, scanner and security vulnerability finder for web applications. ZAP includes Proxy intercepting aspects, a variety of scanners, spiders etc. It works best on most platforms. For more information and in order to download visit the below page.
Download link: ZAP download


8) Netsparker

Netsparker comes with a robust web application scanner that will identify vulnerabilities, suggest remedial action etc. This tool can also help to exploit SQL injection and LFI (local file induction). It has a command-line and GUI interface, it works only on Microsoft Windows. Although there might be few free limited trials available, this is a commercial product.
Download link: Netsparker download


9) BeEF

BeEF stands for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser which means, it takes advantage of the fact that an open web-browser is the window(or crack) into a target system and designs its attacks to go on from this point. It has a GUI interface, works on Linux, Apple Mac OS X and Microsoft Windows. It is an open source and can be found at the below page.

Download link: BeEF download

10) OpenVAS

Stands for Open Vulnerabilities Assessment System. Well, the name says it all. 
For more info, check here.

Friday, February 2, 2018

Learn More

Network Monitoring and Analysis Tools

Several tools are available to help with network monitoring, from open source applications to those that require commercial licenses. Two of such   tools are Zabbix and Nagios. Nagios sets itself up as the “Industry Standard In IT Infrastructure Monitoring” while Zabbix says it is “the Enterprise-class Monitoring Solution for Everyone”.

1) Zabbix

Zabbix is an Open-Source platform for monitoring network devices as well as servers and workstations in real time.
Zabbix Agent is installed on remote systems to remote monitor a workstation or a server through Zabbix server. The Zabbix agent collects data and resource utilization as well as applications data on client system and provides information to zabbix server and to the monitoring Zabbix dashboard.
Pros:
  • Capable of producing customizable maps and logical interconnection diagrams to better visualize network.
  • Simple installation and configuration
  • An all-in-one solution, which helps monitor and manage network performance across the board.
  • Can run with or without an agent
Cons:
  • Although scalable, it doesn’t always function particularly well with large infrastructure
  • Reporting and monitoring functions could stand to be improved with out-of-the-box support for flat file configuration.
  • Can be difficult to properly secure without documentation
  • Zabbix agent is not required for monitoring of external network services such as FTP, SSH, HTTP, DNS, LDAP, etc.

2)Nagios

Nagios Core is a free and open source computer-software application that monitors systems, networks and infrastructure. Nagios offers monitoring and alerting services for servers, switches, applications and services. It alerts users when things go wrong and alerts them a second time when the problem has been resolved.
Nagios was originally designed to run under Linux, but it also runs well on other UNIX variants. It is free software licensed under the terms of the GNU General Public License version 2 as published by the Free Software Foundation.

For more info, Click here

3)Cacti

Cacti is a LAMP application that provides a complete graphing framework for data of nearly every sort. In some of my more advanced installations of Cacti, I collect data on everything from fluid return temperatures in data center cooling units to free space on filer volumes to FLEXlm license utilization. If a device or service returns numeric data, it can probably be integrated into Cacti. There are templates to monitor a wide variety of devices, from Linux and Windows servers to Cisco routers and switches -- basically anything that speaks SNMP. There are also collections of contributed templates for an even greater array of hardware and software.
While Cacti's default collection method is SNMP, local Perl or PHP scripts can be used as well. The framework deftly separates data collection and graphing into discrete instances, so it's easy to rework and reorganize existing data into different displays. In addition, you can easily select specific timeframes and sections of graphs simply by clicking and dragging. In some of my installations, I have data going back several years, which proves invaluable when determining if current behavior of a network device or server is truly anomalous or, in fact, occurs regularly.
Cacti is an extensive performance graphing and trending tool that can be used to track nearly any monitored metric that can be plotted on a graph. It's also infinitely customizable, which means it can get complex in places.

For more info, click here


4)OpenNMS 



  • OpenNMS is designed for Linux but can support Windows and OSX as well;
  • Easy installation process
  • Features ability to configure “Path Outages”;
  • Offers Event and Notification Management – receiving both internal and external events; 
  • Features thresholding, which is the evaluation of polled latency data or collected performance data against configurable thresholds, creating events when these are exceeded or rearmed;
  • Alarms and automation – reducing events according to a reduction key and scripting automated actions centered on alarms;
  • Sends notifications regarding noteworthy events via e-mail, XMPP, or other means.
Pros: 
  • Free licensing
  • Offers good support and documentation through wikis and mailing lists;
  • Full featured and infinitely flexible
  • “Path outages” featuring “minimize excessive alerting”
  • Reasonable support costs via the OpenNMS Group.
Cons:                                                       

  • Steep learning curve
  • Interface not very intuitive;
  • Requires learning and modifying various config files for customization;
  • Money saved on licensing may have to be spent on development and maintenance.
For more info, Click here

Places

Barju Lake

The Barju Lake (Barju Dah in local language) is located in Barju rural municipality of Sunsari district, is a largest lake in southern  Terrain region of Nepal. It is 10 km due west to Biratnagar metropolitan, a capital city of state no. 1 in Nepal.  

The historically important Barju Lake spreads in an area of 152 bighas, only one-fourth of the lake is filled with water.

Locals in the nearby areas claimed that around 5,000 species of birds have been sighted at the lake.

The local people have been claiming that the lake has its existence from Mahabharata Periods. Because of its rich and natural beauty the numbers of visitors have been growing for different purposes such as boating, picnic and other research purposes.

For Youtube Channel, Click here

Location map


Everest Science Center Nepal

The Everest Science Center Nepal, located in Amahibelaha, Barju-5, Sunsari; approximately seven kilometers west of Biratnagar,Nepal, is the only science center in Nepal.
It is also famous for picnic spot in the name of Shanti Ban.

INSAN FARM

A non-profit making and non-governmental organization founded by a group of likeminded development practitioners including farmers working in the field of sustainable agriculture, is located in Hasanpur, Barju Rural Municipality-4 of Sunsari district, Nepal.

Earlier it was visited by many foreign tourists and was a good place for general people and farmers to observe the scientific and improved methods of farming in agriculture.  

Thursday, February 1, 2018

Computer Graphics

BCA/BIT/BScCSIT/BE(Computer, Electronics and Communication)

Reference Books
Model Questions

Old Questions(PU)


ShortQuestions[2*Marks]


PU Syllabus, 

Download

Class Notes
Ch-1-2
Ch-3
Ch-4[2D]
Ch-4[2D-viewing]
Ch-4[2D-clipping]
Ch-5[3D-GraphicsProjections]
Ch-5[3D-Transformations]
Ch-5[Hidden surface removal techniques]
Ch-5[Non-Planer Surface]
Ch-6[Illumination Model]
Ch-6[Surface Rendering Model]
Ch-7
Ch-8

Here are a few resources on presentations to help you:


References:
1. D. Harn and M. P. Baker, “Computer Graphics”, PHI Edition
2. T. I. James, D. Foley, A. Van Dam, S. K. Feiner, and J. F. Hughes, “Computer Graphics, Principles, and Practice”, PHI Edition
3. Computer Graphics: Download Notes


Numericals
Ch#2
Ch#3
Ch#4

Assignments 

Click Here

CG-Lab
Lab-1
Lab-2